/ Most Commented

Threat of Tiered Pricing Continues in New gTLD Guidebook Version 2

The draft New gTLD Applicant Guidebook (version 2) has been released along with an analysis of the comments to the prior version. The documents are voluminous. I glanced at the revised draft Base Agreement, and it's clearly unacceptable as there continue to be no price caps in place to protect domain name registrants... more

Resolving the ICANN-Proposed TLDs Debate

The Internet Corporation for Assigned Names and Numbers (ICANN) has recently decided to allow any entity to register a top-level domain name (TLD). The best mechanism for valuing this decision, a mechanism that outperforms crowdsourcing, blogs, and committee decisions, is the legal and easy-to-implement solution known as prediction markets.
In handing down its TLD decision, ICANN never identified the problem it was trying to solve... more

Should We Make the Possession of Malware a Crime?

In the U.S., it is a federal crime to use malware to intentionally cause "damage without authorization" to a computer that is used in a manner that affects interstate or foreign commerce. Most, if not all, U.S. states outlaw the use of malware to cause damage, as do many countries. The Council of Europe's Convention on Cybercrime, which the United States ratified a few years ago, has a provision concerning the possession of malware. Article 6(1)(b) of the Convention requires parties to the treaty to criminalize the possession of malware "with intent that it be used for the purpose of committing" a crime involving damage to a computer or data... more

A Seismic Shift: IPv4 Numbers Becoming Transferable and Consequently Property

A Tipping Point for the Internet? Catching the precise moment of a tectonic shift in a global system as large and important as the Internet may be viewed as an exercise in the improbable. However, I point out in this summary that I think we are precisely in the midst of such a shift... more

Monster.com Response to Security Breach Unacceptable

As some of us are continuing to learn this week the Monster.com service has again been successfully hacked. According to a security bulletin posted on Monster.com on January 23rd, 2009, the intruder gained access to the user database, while no resumes were apparently compromised... As a user of Monster.com what I find incredibly upsetting about this situation is that I had to find out about this through a security blog. more

Native Web Applications (NWA) vs. Rich Internet Applications (RIA)

A rewrite of the Rich Internet Application (RIA) article is my latest contribution to Wikipedia following last year's full rewrite of the Cloud Computing article (which is now finally fairly stable and one of the main authoritative sources on the topic; according to the article statistics I've just done my 500th edit, or one every eight hours on average so it's about as up-to-date as you'll find). Needless to say I agree wholeheartedly with Mozilla's Mark Finkle in saying RIA is Dead! Long Live Web Applications... more

Reply-All Creates a DDoS Attack?

One can read in an Associated Press article that the US State Department have their email system bogged down due to too many people use the Reply-All function in their email client. IT Departments have asked people to not use Reply-All and also threaten with disciplinary action. To me, that is the wrong path forward. more

What is Good Policy for a Domain Name Registry?

Back from the holidays I must admit I was thinking quite a bit on what is good policy for a registry? Of course I have my own personal favorites that I can not walk away from easily, but instead of thinking for too long, I decided to write down now immediately what is in my head. The main reasons for this are two: the decision by ICANN to change the rules for change in policy regarding the Add Grace Periods. more

What Could the RIAA’s Switch in Strategy Mean?

The Wall Street Journal and others are reporting that the Recording Industry Association of America is adjusting its strategy for combating the massive infringement occasioned by the sharing of music files over the internet. Since 2003, that strategy has been to pursue copyright infringement cases against individual file sharers. The RIAA now says it will focus less on pursuing infringement litigation and more on working with internet service providers to shut down the accounts of individuals suspected of illegally trading files. more

Is the New “.Tel” Domain More than Just a Pretty Web Interface to DNS?

Is the new ".tel" domain launching today more than just a pretty web interface to DNS? Is it something really unique? Is it a new service that couldn't be easily replicated elsewhere? In case you haven't been following the subject, a company called Telnic has launched a new top-level DNS domain ".tel" today. Today, December 3rd, is the launch of the "Sunrise" period where companies can (for a high price) obtain the ".tel" domain associated with their trademark. more

Voluntary Collective Licensing of Brand-Sharing Domain Names

The essay outlines a market-driven and value-adding solution to brand use in domain names. The solution relies heavily on the Electronic Frontier Foundation's remedy to music file sharing. I propose its adoption for new registrations and renewals. Brand sharing in domain names is here to stay; desperate attempts to stop it through legal action are ineffective and will do nothing but destroy value. more

How Fast is Internet Traffic Growing?

It depends on whose numbers you like. Andrew Odlyzko claims it's up 50-60% over last year, a slower rate of growth than we've seen in recent years. Odlyzko's method is flawed, however, as he only looks at public data, and there is good reason to believed that more and more traffic is moving off the public Internet and its public exchange points to private peering centers. Nemertes collects at least some data on private exchanges and claims a growth rate somewhere between 50-100%. more

Broadband Internet Crunch is Beginning to Occur

Internet demand remains at a rate which could outpace capacity within the next two to four years, according to "Internet Interrupted: Why Architectural Limitations Will Fracture the 'Net," a new report today from Nemertes Research. ...If left unaddressed, the development of next generation applications, from software to interactive video, will likely be stifled as users find Internet infrastructure incapable of efficiently delivering quality content. more

Predicting Domain Name Trademark Infringement

Legal trademark issues related to domain names will take a long time to resolve. Meanwhile, using a statistical model to determine infringement benefits all parties. The legal system has not yet established comprehensive and easy to understand rules under which a domain name is considered to infringe on a third party's trademark. The vacuum allows trademark owners and their agents, such as the Coalition Against Domain Name Abuse (CADNA), to sue domain name owners pretty much at will, but doing so is not always in the best interest of trademark holders. more

ICANN Must Address Domain Tasting Ripple Effects

A registrar who also engages in domain tasting can inadvertently create ripple effects throughout the domain name industry. Thus, domain name owners must exert pressure on ICANN to reduce this risk. We are now experiencing ripple effects from the subprime market and its repercussions on related markets. ...there can be a problem when registrar functions and domain tasting are conducted by the same entity. Unmonitored coupling of seemingly unrelated markets can be devastating to our industry. more